We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best! Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time. #LI-CL1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Staff Threat Intelligence Researcher
Location
United States
Posted
6 days ago
Salary
Not specified
Seniority
Lead
No structured requirement data.
Job Description
Role Description
This role is ideal for highly skilled cybersecurity professionals who thrive on investigating advanced threats and protecting mobile and enterprise ecosystems. As a Staff Threat Intelligence Researcher, you will lead efforts to identify, analyze, and track sophisticated threat actors, including nation-state and financially motivated groups. You will leverage extensive datasets, advanced detection tools, and reverse engineering techniques to uncover mobile malware, malicious infrastructure, and adversary tactics. Your research will directly inform actionable intelligence for internal teams and external clients, shaping security strategy and threat mitigation. This position offers the chance to work on cutting-edge security challenges in a collaborative, innovative environment while contributing to the broader cybersecurity community. Success in this role requires curiosity, technical expertise, and a deep understanding of both cyber threats and geopolitical dynamics.
- Investigate, analyze, and track advanced threat actors, documenting their tactics, techniques, and procedures (TTPs).
- Conduct threat hunting across mobile and enterprise ecosystems, identifying malware campaigns and adversary infrastructure.
- Reverse-engineer and analyze mobile malware to understand capabilities, develop detection rules, and inform defensive strategies.
- Mine internal and external data sources to discover new threats, malware families, and malicious actors.
- Conduct OSINT investigations and provide actionable intelligence reports for clients, partners, and internal teams.
- Develop research tools and innovative approaches to improve threat detection and intelligence coverage.
- Present findings to internal stakeholders, external customers, and at industry conferences, translating complex technical information into clear insights.
Qualifications
- Proven experience in threat hunting, malware analysis, and cybersecurity research.
- Proficiency with reverse engineering tools (e.g., JEB, IDA Pro, Ghidra, Hopper, Frida, Wireshark, DirBuster) and ability to analyze mobile apps.
- Strong coding skills in Python; familiarity with Java, C, ARM Assembly, Objective-C, and Swift is a plus.
- Experience using threat intelligence platforms and frameworks (MITRE ATT&CK, STIX, YARA, MISP, OpenCTI) and familiarity with the intelligence cycle.
- Ability to work with large datasets and security tools (VirusTotal, Validin, Shodan, Lucene, ElasticSearch, AWS Athena).
- Strong analytical, problem-solving, and communication skills for delivering written reports and presentations.
- Interest in geopolitical dynamics and applying contextual knowledge to inform threat analysis.
- Highly curious, self-motivated, and able to work independently in a fast-paced research environment.
Benefits
- Competitive base salary with performance-based bonus and equity opportunities.
- Comprehensive health benefits, including medical, dental, and vision coverage.
- Flexible remote work and collaboration with global security experts.
- Professional development opportunities, including conferences and advanced training.
- Cutting-edge technology and access to large-scale mobile and threat intelligence datasets.
- Inclusive, collaborative, and innovative work environment.
Job Requirements
- Proven experience in threat hunting, malware analysis, and cybersecurity research.
- Proficiency with reverse engineering tools (e.g., JEB, IDA Pro, Ghidra, Hopper, Frida, Wireshark, DirBuster) and ability to analyze mobile apps.
- Strong coding skills in Python; familiarity with Java, C, ARM Assembly, Objective-C, and Swift is a plus.
- Experience using threat intelligence platforms and frameworks (MITRE ATT&CK, STIX, YARA, MISP, OpenCTI) and familiarity with the intelligence cycle.
- Ability to work with large datasets and security tools (VirusTotal, Validin, Shodan, Lucene, ElasticSearch, AWS Athena).
- Strong analytical, problem-solving, and communication skills for delivering written reports and presentations.
- Interest in geopolitical dynamics and applying contextual knowledge to inform threat analysis.
- Highly curious, self-motivated, and able to work independently in a fast-paced research environment.
Benefits
- Competitive base salary with performance-based bonus and equity opportunities.
- Comprehensive health benefits, including medical, dental, and vision coverage.
- Flexible remote work and collaboration with global security experts.
- Professional development opportunities, including conferences and advanced training.
- Cutting-edge technology and access to large-scale mobile and threat intelligence datasets.
- Inclusive, collaborative, and innovative work environment.
Related Guides
Related Categories
Related Job Pages
More Threat Intelligence Specialist Jobs
Design and implement network security solutions in Oracle Cloud Infrastructure (OCI) aligned with security controls and compliance requirements. Work closely with internal teams, vendors, and clients to gather requirements and deliver security solution designs. Develop Bill of Qu...
Staff Threat Intelligence Researcher
LookoutThe endpoint to cloud security company purpose-built for the intersection of enterprise and personal data.
Staff Threat Intelligence Researcher identifying and tracking mobile threat actors
The role involves identifying, analyzing, and tracking advanced nation-state and financially motivated threat actors, including their tactics, techniques, and procedures (TTPs). Responsibilities also include reverse-engineering mobile malware, investigating adversary infrastructure, and developing new detection strategies and rules.
Staff Threat Intelligence Researcher
LookoutThe endpoint to cloud security company purpose-built for the intersection of enterprise and personal data.
We are looking for a Staff Security Researcher to join our Threat Intelligence team, a group of top-tier security researchers working to identify, investigate, and track targeted attacks on users of mobile devices. As a member of this team you will use an extensive arsenal of det...
